CN112243008B - Data management method and device - Google Patents

Data management method and device Download PDF

Info

Publication number
CN112243008B
CN112243008B CN202011112068.0A CN202011112068A CN112243008B CN 112243008 B CN112243008 B CN 112243008B CN 202011112068 A CN202011112068 A CN 202011112068A CN 112243008 B CN112243008 B CN 112243008B
Authority
CN
China
Prior art keywords
internet
data
things
things entity
data operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011112068.0A
Other languages
Chinese (zh)
Other versions
CN112243008A (en
Inventor
黄珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011112068.0A priority Critical patent/CN112243008B/en
Publication of CN112243008A publication Critical patent/CN112243008A/en
Application granted granted Critical
Publication of CN112243008B publication Critical patent/CN112243008B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/30Control
    • G16Y40/35Management of things, i.e. controlling in accordance with a policy or in order to achieve specified objectives
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The application discloses a data management method and device, and belongs to the technical field of communication. The data management method comprises the following steps: receiving a data operation request message sent by an Internet of things entity, verifying the authenticity and the legality of the data operation request message, obtaining an authenticity verification result and a legality verification result, and generating a data operation verification feedback message according to the authenticity verification result and the legality verification result; the data operation verification feedback message is sent to the Internet of things entity, so that the Internet of things entity can execute data operation according to the data operation verification feedback message, the data processing pressure of the Internet of things system can be relieved, and the authenticity and the safety of the Internet of things data are guaranteed.

Description

Data management method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a data management method and apparatus.
Background
At present, in a traditional internet of things system, internet of things data is generally converged from an internet of things entity to the internet of things system, and unified storage and management are performed by the internet of things system. With the advent of the internet of things era, the internet of things equipment will grow in geometric progression in the future, and correspondingly, the internet of things data scale will also continuously climb, and operations such as right confirmation, traceability, protection and the like in the internet of things data management process will lead to the internet of things system to face larger data processing pressure. Meanwhile, the traditional management mode of the internet of things system centralization cannot be self-verified, so that the authenticity and the safety of the internet of things data cannot be guaranteed. Therefore, how to relieve the data processing pressure of the internet of things system and ensure the authenticity and the safety of the internet of things data at the same time becomes a problem to be solved in the field.
Disclosure of Invention
Therefore, the application provides a data management method and device for solving the problems that the data processing pressure of an Internet of things system is increased due to the increase of the data scale of the Internet of things, and the centralized management mode of the Internet of things system cannot guarantee the authenticity and safety of the data of the Internet of things.
In order to achieve the above object, a first aspect of the present application provides a data management method, including:
receiving a data operation request message sent by an Internet of things entity;
respectively verifying the authenticity and the legality of the data operation request message to obtain an authenticity verification result and a legality verification result;
generating a data operation verification feedback message according to the authenticity verification result and the validity verification result;
and sending the data operation verification feedback message to the Internet of things entity so that the Internet of things entity can execute the data operation according to the data operation verification feedback message.
Further, before receiving the data operation request message sent by the internet of things entity, the method further includes:
according to the first operation authority of the Internet of things entity, distributing a second operation authority for the Internet of things entity; the first operation authority is the data operation authority of the Internet of things entity in the Internet of things system, and the second operation authority is the data operation authority of the Internet of things entity in the blockchain system.
Further, according to the first operation authority of the internet of things entity, a second operation authority is allocated to the internet of things entity, including:
receiving an authority acquisition request message sent by an Internet of things entity; the permission acquisition request message comprises a first digital identity of an Internet of things entity, wherein the first digital identity is digital information for identifying the Internet of things entity identity;
determining a first operation authority of the Internet of things entity according to a first digital identity of the Internet of things entity;
determining a second operation authority of the Internet of things entity according to the first operation authority, and distributing the second operation authority for the Internet of things entity;
generating and sending a permission acquisition feedback message to an Internet of things entity; the permission acquisition feedback message comprises a public key, a private key and signature information, wherein the public key and the private key are keys generated by a current node for an entity of the Internet of things, and the signature information is information generated according to a preset first function, a first digital identity and a second operation permission;
generating and broadcasting a first broadcast message to the blockchain network; wherein the first broadcast message includes a first function, a first digital identity, a second operating right, and a public key.
Further, verifying the authenticity of the data operation request message to obtain an authenticity verification result, including:
Generating a second broadcast message based on the data operation request message and broadcasting the second broadcast message in the blockchain network;
receiving an authenticity verification feedback message returned by other nodes except the current node in the block chain network;
judging whether the data operation request message has authenticity according to the authenticity verification feedback message, and obtaining an authenticity verification result.
Further, the second broadcast message includes signature information of the internet of things entity, the authenticity verification feedback message is a message generated by other nodes according to the first broadcast message, obtaining a first digital identity, a second operation authority and a preset first function of the internet of things entity, obtaining a second digital identity and a third operation authority based on the first function and the signature information in the second broadcast message, comparing whether the second digital identity and the third operation authority are consistent with the first digital identity and the second operation authority, and according to a comparison result.
Further, the current node is a processing node selected from nodes of the blockchain network by the blockchain system based on a contention mechanism.
Further, the data operation request message further includes a data operation type of the internet of things entity;
verifying the legitimacy of the data operation request message comprises:
Judging whether the data operation type accords with a second operation authority of the Internet of things entity or not;
and under the condition that the data operation type accords with the second operation authority of the Internet of things entity, determining that the validity of the data operation request message passes the verification.
Further, the data operation verification feedback message is that the authenticity and the validity of the data operation request message are verified;
the data operation verification feedback message is sent to the internet of things entity, so that after the internet of things entity executes the data operation according to the data operation verification feedback message, the method further comprises the following steps:
receiving encrypted operation data sent by an Internet of things entity; the encrypted operation data are obtained by encrypting the operation data by using a private key by an Internet of things entity;
decrypting the encrypted operation data by using a public key of the Internet of things entity to obtain the operation data;
verifying whether the operation data accords with a second operation authority of the Internet of things entity;
and executing corresponding data operation based on the operation data under the condition that the operation data accords with the second operation authority.
In order to achieve the above object, a second aspect of the present application provides a data management apparatus comprising:
the receiving module is used for receiving a data operation request message sent by the Internet of things entity;
The first verification module is used for verifying the authenticity of the data operation request message to obtain an authenticity verification result;
the second verification module is used for verifying the validity of the data operation request message to obtain a validity verification result;
the generating module is used for generating a data operation verification feedback message according to the authenticity verification result and the validity verification result;
and the sending module is used for sending the data operation verification feedback message to the Internet of things entity so that the Internet of things entity can execute the data operation according to the data operation verification feedback message.
Further, the data management apparatus further includes:
the permission distribution module is used for distributing second operation permissions for the Internet of things entity according to the first operation permissions of the Internet of things entity; the first operation authority is the data operation authority of the Internet of things entity in the Internet of things system, and the second operation authority is the data operation authority of the Internet of things entity in the blockchain system.
The application has the following advantages:
according to the data management method, a data operation request message sent by an Internet of things entity is received, authenticity and legality of the data operation request message are verified, an authenticity verification result and a legality verification result are obtained, and a data operation verification feedback message is generated according to the authenticity verification result and the legality verification result; the data operation verification feedback message is sent to the Internet of things entity, so that the Internet of things entity can execute data operation according to the data operation verification feedback message, the data processing pressure of the Internet of things system can be relieved, and the authenticity and the safety of the Internet of things data are guaranteed.
Drawings
The accompanying drawings are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate the application and, together with the description, do not limit the application.
Fig. 1 is a flowchart of a data management method according to a first embodiment of the present application;
FIG. 2 is a flowchart of a data management method according to a second embodiment of the present application;
FIG. 3 is a flowchart of a method for verifying the authenticity of a data operation request message according to a first embodiment of the present application;
FIG. 4 is a flowchart of a method for verifying the validity of a data operation request message according to a first embodiment of the present application;
FIG. 5 is a flowchart of a data management method according to a third embodiment of the present application;
fig. 6 is a schematic block diagram of a data management device according to a fourth embodiment of the present application;
fig. 7 is a schematic block diagram of a data management apparatus according to a fifth embodiment of the present application.
In the drawings:
601: the receiving module 602: first verification module
603: the second verification module 604: generating module
605: transmitting module
701: rights assignment module 702: receiving module
703: the first verification module 704: second verification module
705: the generating module 706: transmitting module
Detailed Description
The following detailed description of specific embodiments of the present application refers to the accompanying drawings. It should be understood that the detailed description is presented herein for purposes of illustration and explanation only and is not intended to limit the present application.
According to the data management method and device, on one hand, the fact that the data scale of the Internet of things is increased rapidly along with the increase of the number of the devices of the Internet of things is considered, so that larger data processing pressure is caused to an Internet of things system, and on the other hand, the fact that the authenticity and safety of the data of the Internet of things cannot be guaranteed by the existing centralized management mode of the Internet of things system is considered, therefore, the novel data management method and device are provided, the Internet of things data is efficiently managed by combining the Internet of things technology and the blockchain technology, the data processing pressure of the Internet of things system is relieved, and meanwhile the authenticity and the safety of the data of the Internet of things can be guaranteed.
Fig. 1 is a flowchart of a data management method according to a first embodiment of the present application. As shown in fig. 1, the data management method may include the steps of:
step S110, a data operation request message sent by an Internet of things entity is received.
The internet of things entity is a generic term for various sensing devices in the internet of things. In this embodiment, the node in the blockchain network that receives the data operation request message sent by the internet of things entity may be a node pre-designated by the blockchain system, or may be a processing node that is screened from all the nodes in the blockchain network by the blockchain system through a preset contention response mechanism. In an embodiment of screening processing nodes through a contention mechanism, an entity of the internet of things may send a data operation request message to a blockchain system through a dedicated data channel, determine the processing node that responds to the data operation request message through the contention mechanism by the blockchain system, and perform subsequent related operations by the processing node based on the data operation request message.
The Internet of things, namely the Internet with everything connected, is a network formed by extending and expanding the Internet, and is a huge network formed by combining various information sensing devices with the Internet. In a traditional internet of things system, various information sensing devices are used for converging internet of things data to the internet of things system in a unified manner, and the internet of things system is used for carrying out unified storage and management. With the advent of the internet of things era, the internet of things equipment will grow in geometric progression in the future, and correspondingly, the internet of things data scale will also continuously climb, and operations such as right confirmation, traceability, protection and the like in the internet of things data management process will lead to the internet of things system to face larger data processing pressure. Meanwhile, the traditional internet of things system generally adopts a centralized management mode, but the centralized management mode cannot be self-confirmed, so that the authenticity and the safety of the internet of things data cannot be ensured. In addition, in the centralized management mode, once the database of the internet of things system fails, the whole internet of things system is greatly affected.
The block chain technology can provide a distributed storage function, can also ensure the authenticity of data, and can effectively prevent the data from being illegally tampered, so that the block chain technology can be combined with the existing physical network technology. In view of this, the application proposes a new data management method, combines the technology of the internet of things and the technology of the blockchain, stores the data of the internet of things in the block of the blockchain system, simultaneously gives the operation authority of the entity of the internet of things in the blockchain system, the entity of the internet of things can operate the data of the internet of things in the blockchain system according to the operation authority, and the data of the internet of things in the blockchain system can be stored in a distributed manner due to the data characteristic of the blockchain, and can avoid illegal tampering, so that the safety of the data of the internet of things is ensured.
In one embodiment, when the internet of things entity needs to operate on the internet of things data (operation types include, but are not limited to, access, storage, modification, and deletion), and there is a data operation requirement, the internet of things entity generates a data operation request message based on the signature information and the data operation type, and sends the data operation request message to the blockchain system. After the blockchain system receives the data operation request message sent by the internet of things entity, processing nodes responding to the data operation request message are screened from all nodes of the blockchain network based on a preset competition mechanism. The node receives and responds to the data operation request message of the Internet of things entity.
The signature information is generated according to a preset first function, a first digital identity and a second operation authority. The first digital identity is digital information for identifying the identity of the Internet of things entity, the Internet of things entity can acquire the first digital identity from the authority, and the authority comprises a functional mechanism with authority for managing the Internet of things entity. For example, an internet of things entity uses registration information (the registration information includes, but is not limited to, an internet of things address, an entity type and real identity information of the internet of things entity in the internet of things) to perform identity registration at an authority, and after the authority determines the authenticity of the registration information, a first digital identity of the internet of things entity is generated and issued to the internet of things entity. Moreover, the first digital identity often further includes a first operation right of the internet of things entity, which is a data operation right of the internet of things entity in the internet of things system. The second operation authority is the data operation authority of the entity of the internet of things in the blockchain system, and generally, the second operation authority has a corresponding relation with the first operation authority. The first function is a preset calculation method or calculation rule for acquiring signature information, specifically, the first digital identity and the second operation authority are used as input of the first function, and the signature information of the Internet of things entity can be acquired through operation of the first function. The first function may be a random function or a homomorphic function, which is not limited in this application.
Step S120, respectively verifying the authenticity and the legality of the data operation request message to obtain an authenticity verification result and a legality verification result.
The authenticity verification is carried out on the data operation request message to ensure that the data operation request message is a message actually sent by the Internet of things entity, but not a false message sent by other illegal entities impersonating the real Internet of things entity; the validity verification is performed on the data operation request message to ensure that the operation request of the Internet of things entity accords with the operation authority of the Internet of things entity, and the operation authority range of the Internet of things entity is not exceeded.
In one embodiment, the data operation request message includes signature information of the internet of things entity and a data operation type.
First, the current node verifies the authenticity of the data operation request message based on the signature information. Specifically, the current node generates a second broadcast message according to the data operation request message, and broadcasts the second broadcast message in the blockchain network, wherein the second broadcast message comprises signature information of the internet of things entity. The method comprises the steps that other nodes except a current node in a blockchain network receive second broadcast messages, a first digital identity, a second operation authority and a first function corresponding to an Internet of things entity are obtained from a block of the blockchain network, operation is conducted based on the first function and signature information in the second broadcast messages, the second digital identity and a third operation authority are obtained, whether the second digital identity and the third operation authority obtained through calculation are identical to the first digital identity and the second operation authority obtained from the block or not is compared, a comparison result is obtained, an authenticity verification feedback message is generated according to the comparison result, and the authenticity verification feedback message is sent to the current node. And the current node receives the authenticity verification feedback information returned by the other nodes, determines the verification result of the other nodes on the data operation request information according to the authenticity verification feedback information, and determines that the data operation request information passes the authenticity verification if the verification results of all the other nodes in the blockchain network pass the authentication.
Secondly, the current node verifies the validity of the data operation request message based on the data operation type. Specifically, the current node determines a second operation authority of the internet of things entity, judges whether the data operation type accords with the second operation authority of the internet of things entity, and determines that the data operation request message passes the validity verification when the data operation type accords with the second operation authority of the internet of things entity, otherwise, determines that the data operation request message does not pass the validity verification.
It should be noted that, the authenticity and validity of the data operation request message can be independently and concurrently verified; or verifying the authenticity of the data operation request message in advance, and then verifying the legitimacy of the data operation request message; of course, the validity of the data operation request message can be verified a priori, and then the authenticity of the data operation request message can be verified. It can be understood that in the latter two embodiments, if the verification result of the first authenticity/validity is that the verification is not passed, the subsequent verification operation of the authenticity/validity is not performed any more, and the flow is directly ended.
Step S130, a data operation verification feedback message is generated according to the authenticity verification result and the validity verification result.
The data operation verification feedback message comprises two types of verification passing and verification failing, and the data operation verification feedback message passing the verification is obtained only when the data operation request message passes the authenticity verification and the validity verification simultaneously.
In one embodiment, when the data operation request message passes the authenticity verification and the validity verification at the same time, the current node performs a secondary signature on the data operation request message (the data operation request message comprises signature information of an internet of things entity, and the signature information represents a primary signature) to generate a data operation verification feedback message; when the authenticity and/or legitimacy of the data operation request message is not verified, the current node generates a data operation verification feedback message with contents of rejecting the data operation.
Step S140, the data operation verification feedback message is sent to the Internet of things entity, so that the Internet of things entity can execute data operation according to the data operation verification feedback message.
In one embodiment, the current node sends a data operation verification feedback message to an internet of things entity, the internet of things entity receives the data operation verification feedback message, and whether the data operation verification feedback message passes the authenticity and validity verification is known according to the data operation verification feedback message. Specifically, if the data operation verification feedback message is a message generated by performing secondary signature on the data operation request message by the current node, the internet of things entity determines that the data operation request message passes the verification of authenticity and legitimacy; and if the content of the data operation verification feedback message is refusal data operation, the Internet of things entity determines that the data operation request message fails the authenticity and/or validity verification.
When the entity of the Internet of things acquires that the authenticity and the legality are verified through the data operation verification feedback message, the node of the Internet of things reads corresponding data from the blockchain system according to the content of the data operation request message or writes the corresponding data into the blockchain system; when the Internet of things entity knows that the authenticity and/or the validity verification is not passed through the data operation verification feedback message, the Internet of things entity does not execute corresponding data operation.
Fig. 2 is a flowchart of a data management method according to a second embodiment of the present application, which is substantially the same as the first embodiment of the present application, except that: before receiving a data operation request message sent by an Internet of things entity, corresponding data permission is allocated for the Internet of things entity. As shown in fig. 2, the data management method may include the steps of:
step S210, according to the first operation authority of the Internet of things entity, a second operation authority is allocated to the Internet of things entity.
In order to facilitate management, different data operation authorities are set for the Internet of things entity, and the Internet of things entity can access and only access authorized Internet of things data. In this embodiment, the internet of things entity can operate the internet of things data in the internet of things system and the blockchain system, so that a first operation authority and a second operation authority need to be set for the internet of things entity respectively; the first operation authority is the data operation authority of the Internet of things entity in the Internet of things system, and the second operation authority is the data operation authority of the Internet of things entity in the blockchain system. For the first operation authority, the internet of things entity can agree with the first operation authority of the internet of things entity in the first digital identity by the authority when the authority acquires the first digital identity, so that the first operation authority is determined through the first digital identity. For the second operation right, the entity of the internet of things needs to be acquired through the blockchain system.
In one embodiment, an internet of things entity sends a rights acquisition request message to a blockchain system, wherein the rights acquisition request message includes a first digital identity of the internet of things entity. The blockchain system receives the permission acquisition request message sent by the Internet of things entity, and selects one node from the nodes of the blockchain network as a processing node through a preset competition mechanism. The processing node (namely the current node) responds to the permission acquisition request message, determines the first operation permission of the Internet of things entity according to the first digital identity of the Internet of things entity, then determines the second operation permission of the Internet of things entity according to the first operation permission, and distributes the second operation permission for the Internet of things entity. The current node further generates a public key and a private key for the Internet of things entity, generates signature information of the Internet of things entity by using a preset first function, a first digital identity and a second operation authority, generates an authority acquisition feedback message based on the public key, the private key and the signature information, and sends the authority acquisition feedback message to the Internet of things entity. The first function is a preset function and comprises a random function, a homomorphic function and the like, and the blockchain system can flexibly set the first function according to requirements.
Meanwhile, in order to enable other nodes in the blockchain network to know that the Internet of things entity has been granted the second operation authority and to facilitate the other nodes to verify the operation authority of the Internet of things entity, the current node generates a first broadcast message based on the first function, the first digital identity, the second operation authority and the public key and broadcasts the first broadcast message in the blockchain network. The other nodes receive the first broadcast message, and store the first function, the first digital identity, the second operation authority and the public key of the internet of things entity in the first broadcast message into the corresponding blocks.
Step S220, a data operation request message sent by the entity of the Internet of things is received.
Step S230, respectively verifying the authenticity and the legality of the data operation request message to obtain an authenticity verification result and a legality verification result.
Step S240, a data operation verification feedback message is generated according to the authenticity verification result and the validity verification result.
Step S250, the data operation verification feedback message is sent to the Internet of things entity, so that the Internet of things entity can execute data operation according to the data operation verification feedback message.
The contents of step S220 to step S250 in the present embodiment are the same as those of step S110 to step S140 in the first embodiment of the present application, and are not described here again.
Fig. 3 is a flowchart of a method for verifying authenticity of a data operation request message according to a first embodiment of the present application. As shown in fig. 3, the method of verifying the authenticity of a data manipulation request message may include the steps of:
step S131a, a second broadcast message is generated based on the data operation request message and broadcast in the blockchain network.
In some embodiments, the authenticity of the data operation request message is initially verified by other nodes in the blockchain network, and the initial verification result is fed back to the current node. The current node gathers the preliminary verification results of all other nodes, and then determines whether the data operation request message passes the authenticity verification according to the gathered preliminary verification results.
In one embodiment, the current node generates a second broadcast message based on the signature information in the data operation request message and broadcasts the second broadcast message in the blockchain network. The second broadcast message includes signature information of the internet of things entity.
In step S132a, an authenticity verification feedback message returned by nodes other than the current node in the blockchain network is received.
In one embodiment, other nodes in the blockchain network receive the second broadcast message, and obtain signature information of the internet of things entity from the second broadcast message. The other nodes acquire a first digital identity, a second operation authority and a first function of the Internet of things entity from a block of the block chain system, operate based on the first function and signature information to acquire a second digital identity and a third operation authority, compare whether the second digital identity and the third operation authority acquired by calculation are identical with the first digital identity and the second operation authority acquired from the block, acquire a comparison result, generate an authenticity verification feedback message based on the comparison result, and return the authenticity verification feedback message to the current node. Specifically, the other nodes sign the second broadcast message, generate an authenticity verification feedback message, and send the authenticity verification feedback message to the current node, wherein the signature content of the authenticity verification feedback message is a comparison result (the comparison result includes the same and different conditions). The current node receives the authenticity verification feedback message returned by other nodes.
Step S133a, judging whether the data operation request message has authenticity according to the authenticity verification feedback message, and obtaining an authenticity verification result.
In one embodiment, the current node gathers the authenticity verification feedback messages of other nodes, and obtains a comparison result according to the signature of the authenticity verification feedback messages (the comparison result is the preliminary verification result of the other nodes on the data operation request message, and the comparison result comprises the same and different situations). When the signature contents of the authenticity verification feedback messages returned by other nodes are the same as the comparison result, the current node determines that the data operation request message passes the authenticity verification; otherwise, it is determined that the data operation request message fails the authenticity verification.
It will be appreciated that in other embodiments, a node number threshold may be preset, and when the number of other nodes whose comparison result is the same is greater than or equal to the preset node number threshold, the current node determines that the data operation request message passes the authenticity verification. The threshold of the node number can be set according to experience, statistical data or actual service requirements.
Fig. 4 is a flowchart of a method for verifying validity of a data operation request message according to a first embodiment of the present application. As shown in fig. 4, the method of verifying the validity of the data operation request message may include the steps of:
Step S131b, obtaining the data operation type of the internet of things entity.
In one embodiment, the current node receives a data operation request message, where the data operation request message includes a data operation type of the internet of things entity, and the current node obtains the data operation type of the internet of things entity from the data operation request message.
Step S132b, judging whether the data operation type accords with the second operation authority of the Internet of things entity.
In one embodiment, when the data operation type is within the range of the second operation authority, determining that the data operation type accords with the second operation authority of the internet of things entity; when the data operation type exceeds the range of the second operation authority, determining that the data operation type does not accord with the second operation authority of the Internet of things entity
Step S133b, determining that the legitimacy of the data operation request message passes the verification under the condition that the data operation type accords with the second operation authority of the Internet of things entity.
When the data operation type accords with the second operation right of the Internet of things entity, the current data operation type is a legal data operation type, and the current node determines that the data operation request message passes the validity verification.
Step S134b, determining that the validity of the data operation request message is not verified if the data operation type does not conform to the second operation authority of the internet of things entity.
When the data operation type does not accord with the second operation right of the Internet of things entity, the current data operation type is not legal, and the current node determines that the data operation request message does not pass the validity verification.
Step S135b, generating a validity verification result according to whether the validity of the data operation request message passes the verification.
In one embodiment, the validity verification result includes both types of passing and failing validity verification. When the data operation type accords with the second operation authority of the Internet of things entity, determining that the data operation request message passes the validity verification, generating a validity verification result passing the validity verification; and when the data operation type does not accord with the second operation authority of the Internet of things entity, determining that the data operation request message fails the validity verification, generating a validity verification result which fails the validity verification.
Fig. 5 is a flowchart of a data management method according to a third embodiment of the present application, which is substantially the same as the first embodiment of the present application, except that: after the data operation verification feedback message is sent to the Internet of things entity, receiving the operation data sent by the Internet of things entity, and verifying whether the operation data accords with the operation authority of the Internet of things entity. As shown in fig. 5, the data management method may include the steps of:
Step S510, receiving a data operation request message sent by an internet of things entity.
Step S510 in the present embodiment is the same as step S110 in the first embodiment of the present application, and will not be described here again.
Step S520, respectively verifying the authenticity and the legality of the data operation request message to obtain an authenticity verification result and a legality verification result.
Step S520 in the present embodiment is the same as step S120 in the first embodiment of the present application, and will not be described herein.
Step S530, generating a data operation verification feedback message according to the authenticity verification result and the validity verification result.
Step S530 in the present embodiment is the same as step S130 in the first embodiment of the present application, and will not be described here again.
Step S540, the data operation verification feedback message is sent to the Internet of things entity, so that the Internet of things entity executes the data operation according to the data operation verification feedback message.
Step S540 in the present embodiment is the same as step S140 in the first embodiment of the present application, and will not be described herein.
Step S550, receiving the encrypted operation data sent by the internet of things entity.
The encrypted operation data are obtained by encrypting the operation data by using a private key by an Internet of things entity.
In one embodiment, after the data operation request message of the internet of things entity passes the authenticity and validity verification, the internet of things entity may write specific operation data into the block of the blockchain network. Specifically, the internet of things entity encrypts the operation data by using the private key to obtain encrypted operation data, and sends the operation data to the blockchain system. The blockchain system selects a node as a response node based on a preset contention mechanism. The node receives encrypted operation data sent by the Internet of things entity. The private key is a key obtained by the entity of the Internet of things in the process of applying for the second operation authority from the blockchain system.
Step S560, decrypting the encrypted operation data by using the public key of the internet of things entity to obtain the operation data.
In one embodiment, after receiving the encrypted operation data, the current node searches a public key of the internet of things entity from a block of the blockchain system, and decrypts the encrypted operation data by using the public key to obtain the operation data.
Step S570, verifying whether the operation data accords with the second operation authority of the internet of things entity.
In one embodiment, the second operation authority specifies what operation can be performed on what data by the internet of things entity. After the current node obtains the operation data, verifying whether the operation data accords with the second operation authority of the Internet of things entity so as to avoid the operation of the Internet of things entity on the data outside the operation authority.
In step S580, in the case where the operation data conforms to the second operation authority, the corresponding data operation is performed based on the operation data.
In one embodiment, when the operation data accords with the second operation right, the operation right is indicated to the operation data by the internet of things entity. The Internet of things entity writes the operation data into the block corresponding to the block chain system.
It should be noted that, other data operation types exist in the internet of things entity, and the data operation process is similar to the embodiment and will not be described herein.
The above steps of the methods are divided, for clarity of description, and may be combined into one step or split into multiple steps when implemented, so long as they include the same logic relationship, and they are all within the protection scope of this patent; it is within the scope of this patent to add insignificant modifications to the algorithm or flow or introduce insignificant designs, but not to alter the core design of its algorithm and flow.
Fig. 6 is a schematic block diagram of a data management apparatus according to a fourth embodiment of the present application. As shown in fig. 6, the data management apparatus includes: a receiving module 601, a first verifying module 602, a second verifying module 603, a generating module 604 and a transmitting module 605.
The receiving module 601 is configured to receive a data operation request message sent by an internet of things entity.
In one embodiment, when the internet of things entity needs to operate on internet of things data, and there is a data operation demand, the internet of things entity generates a data operation request message based on the signature information and the data operation type, and sends the data operation request message to the blockchain system. After the blockchain system receives the data operation request message sent by the internet of things entity, processing nodes responding to the data operation request message are screened from all nodes of the blockchain network based on a preset competition mechanism. The node receives the data operation request message of the internet of things entity through the receiving module 601, and responds to the data operation request message of the internet of things entity.
The first verification module 602 is configured to verify the authenticity of the data operation request message, and obtain an authenticity verification result.
In one embodiment, the data operation request message includes signature information of the internet of things entity, and the current node verifies the authenticity of the data operation request message through the first verification module 602 based on the signature information. Specifically, the current node generates a second broadcast message according to the data operation request message, and broadcasts the second broadcast message in the blockchain network, wherein the second broadcast message comprises signature information of the internet of things entity. The method comprises the steps that other nodes except a current node in a blockchain network receive second broadcast messages, a first digital identity, a second operation authority and a first function corresponding to an Internet of things entity are obtained from a block of the blockchain network, operation is conducted based on the first function and signature information in the second broadcast messages, the second digital identity and a third operation authority are obtained, whether the second digital identity and the third operation authority obtained through calculation are identical to the first digital identity and the second operation authority obtained from the block or not is compared, a comparison result is obtained, an authenticity verification feedback message is generated according to the comparison result, and the authenticity verification feedback message is sent to the current node. And the current node receives the authenticity verification feedback information returned by the other nodes, determines the verification result of the other nodes on the data operation request information according to the authenticity verification feedback information, and determines that the data operation request information passes the authenticity verification if the verification results of all the other nodes in the blockchain network pass the authentication.
The second verification module 603 is configured to verify the validity of the data operation request message, and obtain a validity verification result.
In one embodiment, the data operation request message includes an internet of things entity data operation type, and the current node verifies the validity of the data operation request message through the second verification module 603 based on the data operation type. Specifically, the current node determines a second operation authority of the internet of things entity, judges whether the data operation type accords with the second operation authority of the internet of things entity, and determines that the data operation request message passes the validity verification when the data operation type accords with the second operation authority of the internet of things entity, otherwise, determines that the data operation request message does not pass the validity verification.
And the generating module 604 is configured to generate a data operation verification feedback message according to the authenticity verification result and the validity verification result.
The data operation verification feedback message comprises two types of verification passing and verification failing, and the data operation verification feedback message passing the verification is obtained only when the data operation request message passes the authenticity verification and the validity verification simultaneously.
In one embodiment, when the data operation request message passes both the authenticity verification and the validity verification, the current node performs a secondary signature on the data operation request message (the data operation request message includes signature information of the internet of things entity, the signature information indicates a primary signature), and generates a data operation verification feedback message through the generation module 604; when the authenticity and/or legitimacy of the data operation request message is not verified, the current node generates a data operation verification feedback message with contents of rejecting the data operation through the generation module 604.
The sending module 605 is configured to send the data operation verification feedback message to the internet of things entity, so that the internet of things entity performs the data operation according to the data operation verification feedback message.
In one embodiment, the current node sends the data operation verification feedback message to the internet of things entity through the sending module 605, and the internet of things entity receives the data operation verification feedback message and knows whether the authenticity and validity verification is passed according to the data operation verification feedback message. Specifically, if the data operation verification feedback message is a message generated by performing secondary signature on the data operation request message by the current node, the internet of things entity determines that the data operation request message passes the verification of authenticity and legitimacy; and if the content of the data operation verification feedback message is refusal data operation, the Internet of things entity determines that the data operation request message fails the authenticity and/or validity verification.
Fig. 7 is a schematic block diagram of a data management apparatus according to a fifth embodiment of the present application. As shown in fig. 7, the data management apparatus includes: rights allocation module 701, receiving module 702, first authentication module 703, second authentication module 704, generating module 705 and transmitting module 706.
The permission distribution module 701 is configured to distribute a second operation permission to the internet of things entity according to the first operation permission of the internet of things entity.
The first operation authority is the data operation authority of the Internet of things entity in the Internet of things system, and the second operation authority is the data operation authority of the Internet of things entity in the blockchain system.
In one embodiment, an internet of things entity sends a rights acquisition request message to a blockchain system, wherein the rights acquisition request message includes a first digital identity of the internet of things entity. The blockchain system receives the permission acquisition request message sent by the Internet of things entity, and selects one node from the nodes of the blockchain network as a processing node through a preset competition mechanism. The processing node (i.e. the current node) responds to the permission acquisition request message, determines a first operation permission of the internet of things entity according to a first digital identity of the internet of things entity, then determines a second operation permission of the internet of things entity according to the first operation permission, and distributes the second operation permission for the internet of things entity through the permission distribution module 701. The current node further generates a public key and a private key for the Internet of things entity, generates signature information of the Internet of things entity by using a preset first function, a first digital identity and a second operation authority, generates an authority acquisition feedback message based on the public key, the private key and the signature information, and sends the authority acquisition feedback message to the Internet of things entity. The first function is a preset function and comprises a random function, a homomorphic function and the like, and the blockchain system can flexibly set the first function according to requirements.
Meanwhile, in order to enable other nodes in the blockchain network to know that the Internet of things entity has been granted the second operation authority and to facilitate the other nodes to verify the operation authority of the Internet of things entity, the current node generates a first broadcast message based on the first function, the first digital identity, the second operation authority and the public key and broadcasts the first broadcast message in the blockchain network. The other nodes receive the first broadcast message, and store the first function, the first digital identity, the second operation authority and the public key of the internet of things entity in the first broadcast message into the corresponding blocks.
The receiving module 702 is configured to receive a data operation request message sent by an entity of the internet of things.
The content of the receiving module 702 in this embodiment is the same as that of the receiving module 601 in the fourth embodiment of the present application, and will not be described here again.
The first verification module 703 is configured to verify the authenticity of the data operation request message, and obtain an authenticity verification result.
The content of the receiving module 703 in this embodiment is the same as that of the receiving module 602 in the fourth embodiment of the present application, and will not be described here again.
And the second verification module 704 is configured to verify the validity of the data operation request message, and obtain a validity verification result.
The content of the receiving module 704 in this embodiment is the same as that of the receiving module 603 in the fourth embodiment of the present application, and will not be described here again.
And the generating module 705 is configured to generate a data operation verification feedback message according to the authenticity verification result and the validity verification result.
The content of the receiving module 705 in this embodiment is the same as that of the receiving module 604 in the fourth embodiment of the present application, and will not be described here again.
The sending module 706 is configured to send the data operation verification feedback message to the internet of things entity, so that the internet of things entity performs the data operation according to the data operation verification feedback message.
The content of the receiving module 706 in this embodiment is the same as that of the receiving module 605 in the fourth embodiment of the present application, and will not be described here again.
It should be noted that each module in this embodiment is a logic module, and in practical application, one logic unit may be one physical unit, or may be a part of one physical unit, or may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present application, elements that are not so close to solving the technical problem presented in the present application are not introduced in the present embodiment, but it does not indicate that other elements are not present in the present embodiment.
It is to be understood that the above embodiments are merely illustrative of the exemplary embodiments employed to illustrate the principles of the present application, however, the present application is not limited thereto. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the application, and are also considered to be within the scope of the application.

Claims (3)

1. A method of data management, comprising:
receiving a data operation request message sent by an Internet of things entity;
respectively verifying the authenticity and the legality of the data operation request message to obtain an authenticity verification result and a legality verification result;
generating a data operation verification feedback message according to the authenticity verification result and the validity verification result;
the data operation verification feedback message is sent to the Internet of things entity, so that the Internet of things entity can execute data operation according to the data operation verification feedback message;
before receiving the data operation request message sent by the internet of things entity, the method further comprises:
distributing second operation rights to the Internet of things entity according to the first operation rights of the Internet of things entity; the first operation authority is the data operation authority of the Internet of things entity in the Internet of things system, and the second operation authority is the data operation authority of the Internet of things entity in the blockchain system;
The allocating a second operation right to the internet of things entity according to the first operation right of the internet of things entity comprises:
receiving an authority acquisition request message sent by the Internet of things entity; the permission acquisition request message comprises a first digital identity of the Internet of things entity, wherein the first digital identity is digital information for identifying the Internet of things entity identity;
determining the first operation authority of the Internet of things entity according to the first digital identity of the Internet of things entity;
determining the second operation authority of the Internet of things entity according to the first operation authority, and distributing the second operation authority for the Internet of things entity;
generating and sending a permission acquisition feedback message to the Internet of things entity; the permission acquisition feedback message comprises a public key, a private key and signature information, wherein the public key and the private key are keys generated by a current node for the Internet of things entity, and the signature information is information generated according to a preset first function, the first digital identity and the second operation permission;
generating and broadcasting a first broadcast message to the blockchain network; wherein the first broadcast message includes the first function, the first digital identity, the second operation right, and the public key;
The verifying the authenticity of the data operation request message to obtain an authenticity verification result comprises the following steps:
generating a second broadcast message based on the data operation request message, and broadcasting the second broadcast message in a blockchain network;
receiving an authenticity verification feedback message returned by other nodes except the current node in the blockchain network;
judging whether the data operation request message has authenticity according to the authenticity verification feedback message, and obtaining the authenticity verification result;
the second broadcast message comprises signature information of the internet of things entity, the authenticity verification feedback message is a message generated by the other nodes according to a comparison result, wherein the other nodes acquire a first digital identity, a second operation authority and a preset first function of the internet of things entity according to a first broadcast message, acquire a second digital identity and a third operation authority based on the first function and the signature information in the second broadcast message, and compare whether the second digital identity and the third operation authority are consistent with the first digital identity and the second operation authority;
the data operation request message further comprises a data operation type of the Internet of things entity;
The verifying the validity of the data operation request message comprises the following steps:
judging whether the data operation type accords with a second operation authority of the Internet of things entity;
under the condition that the data operation type accords with the second operation authority of the Internet of things entity, determining that the validity of the data operation request message passes verification;
the data operation verification feedback message is that the authenticity and the legality of the data operation request message are verified;
the sending the data operation verification feedback message to the internet of things entity, so that the internet of things entity performs the data operation according to the data operation verification feedback message, further includes:
receiving encrypted operation data sent by the Internet of things entity; the encrypted operation data are obtained by encrypting the operation data by using a private key by the Internet of things entity;
decrypting the encrypted operation data by using the public key of the Internet of things entity to obtain the operation data;
verifying whether the operation data accords with a second operation authority of the Internet of things entity;
and executing corresponding data operation based on the operation data under the condition that the operation data accords with the second operation authority.
2. The method of claim 1, wherein the current node is a processing node selected by a blockchain system from nodes of the blockchain network based on a contention mechanism.
3. A data management apparatus, comprising:
the receiving module is used for receiving a data operation request message sent by the Internet of things entity;
the first verification module is used for verifying the authenticity of the data operation request message to obtain an authenticity verification result;
the second verification module is used for verifying the validity of the data operation request message to obtain a validity verification result;
the generating module is used for generating a data operation verification feedback message according to the authenticity verification result and the validity verification result;
the sending module is used for sending the data operation verification feedback message to the Internet of things entity so that the Internet of things entity can execute data operation according to the data operation verification feedback message;
the data management apparatus further includes:
the permission distribution module is used for distributing second operation permissions for the Internet of things entity according to the first operation permissions of the Internet of things entity; the first operation authority is the data operation authority of the Internet of things entity in the Internet of things system, and the second operation authority is the data operation authority of the Internet of things entity in the blockchain system;
The permission distribution module is further configured to:
receiving an authority acquisition request message sent by the Internet of things entity; the permission acquisition request message comprises a first digital identity of the Internet of things entity, wherein the first digital identity is digital information for identifying the Internet of things entity identity;
determining the first operation authority of the Internet of things entity according to the first digital identity of the Internet of things entity;
determining the second operation authority of the Internet of things entity according to the first operation authority, and distributing the second operation authority for the Internet of things entity;
generating and sending a permission acquisition feedback message to the Internet of things entity; the permission acquisition feedback message comprises a public key, a private key and signature information, wherein the public key and the private key are keys generated by a current node for the Internet of things entity, and the signature information is information generated according to a preset first function, the first digital identity and the second operation permission;
generating and broadcasting a first broadcast message to the blockchain network; wherein the first broadcast message includes the first function, the first digital identity, the second operation right, and the public key;
The first verification module is specifically configured to:
generating a second broadcast message based on the data operation request message, and broadcasting the second broadcast message in a blockchain network;
receiving an authenticity verification feedback message returned by other nodes except the current node in the blockchain network;
judging whether the data operation request message has authenticity according to the authenticity verification feedback message, and obtaining the authenticity verification result;
the second broadcast message comprises signature information of the internet of things entity, the authenticity verification feedback message is a message generated by the other nodes according to a comparison result, wherein the other nodes acquire a first digital identity, a second operation authority and a preset first function of the internet of things entity according to a first broadcast message, acquire a second digital identity and a third operation authority based on the first function and the signature information in the second broadcast message, and compare whether the second digital identity and the third operation authority are consistent with the first digital identity and the second operation authority;
the data operation request message further comprises a data operation type of the Internet of things entity; the second verification module is specifically configured to:
Judging whether the data operation type accords with a second operation authority of the Internet of things entity;
under the condition that the data operation type accords with the second operation authority of the Internet of things entity, determining that the validity of the data operation request message passes verification;
the data operation verification feedback message is that the authenticity and the legality of the data operation request message are verified;
the permission distribution module is further configured to:
the data operation verification feedback message is sent to the internet of things entity, so that the internet of things entity executes the data operation according to the data operation verification feedback message:
receiving encrypted operation data sent by the Internet of things entity; the encrypted operation data are obtained by encrypting the operation data by using a private key by the Internet of things entity;
decrypting the encrypted operation data by using the public key of the Internet of things entity to obtain the operation data;
verifying whether the operation data accords with a second operation authority of the Internet of things entity;
and executing corresponding data operation based on the operation data under the condition that the operation data accords with the second operation authority.
CN202011112068.0A 2020-10-16 2020-10-16 Data management method and device Active CN112243008B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011112068.0A CN112243008B (en) 2020-10-16 2020-10-16 Data management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011112068.0A CN112243008B (en) 2020-10-16 2020-10-16 Data management method and device

Publications (2)

Publication Number Publication Date
CN112243008A CN112243008A (en) 2021-01-19
CN112243008B true CN112243008B (en) 2023-06-02

Family

ID=74168785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011112068.0A Active CN112243008B (en) 2020-10-16 2020-10-16 Data management method and device

Country Status (1)

Country Link
CN (1) CN112243008B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487801A (en) * 2016-11-03 2017-03-08 江苏通付盾科技有限公司 Information Authentication method and device based on block chain
CN107749848A (en) * 2017-10-23 2018-03-02 中国联合网络通信集团有限公司 Processing method, device and the Internet of things system of Internet of Things data
CN107846282A (en) * 2017-11-03 2018-03-27 法信公证云(厦门)科技有限公司 A kind of electronic data distribution keeping method and system based on block chain technology
CN109587238A (en) * 2018-12-03 2019-04-05 百度在线网络技术(北京)有限公司 The data processing of block chain and synchronous method, device, equipment and storage medium
CN109981682A (en) * 2019-04-10 2019-07-05 北京阿尔山区块链联盟科技有限公司 Data verification method, the apparatus and system of internet of things equipment
CN110457928A (en) * 2019-08-16 2019-11-15 重庆华医康道科技有限公司 Doctor based on block chain looks forward to cooperation internet hospital data method for protecting
CN111010372A (en) * 2019-11-20 2020-04-14 国家信息中心 Block chain network identity authentication system, data processing method and gateway equipment
US10790976B1 (en) * 2018-08-01 2020-09-29 Bloomio Ag System and method of blockchain wallet recovery

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1335558A1 (en) * 2002-02-06 2003-08-13 SwissSign AG Methods and apparatus for secure data management, secure data retrieval and routing
CN102497398B (en) * 2011-11-30 2014-09-17 中国联合网络通信集团有限公司 Sensor authentication method and system
WO2017191472A1 (en) * 2016-05-05 2017-11-09 Invasec Ltd. A verification system and method
CN107040585B (en) * 2017-02-22 2020-06-19 创新先进技术有限公司 Service checking method and device
GB2565052B (en) * 2017-07-27 2020-08-19 Arm Ip Ltd Authorized operations in electronic systems
CN108696502B (en) * 2018-03-27 2020-10-20 深圳市网心科技有限公司 Block chain node authority control method, block chain system and storage medium
CN108694330B (en) * 2018-05-15 2022-04-26 中国联合网络通信集团有限公司 Internet of things data management method, platform and equipment
CN109299053B (en) * 2018-09-04 2021-03-02 中国联合网络通信集团有限公司 File operation method, device and computer storage medium
US20200097862A1 (en) * 2018-09-26 2020-03-26 Mastercard International Incorporated Method and system for ownership verification via blockchain
CN109861996B (en) * 2019-01-17 2023-06-02 深圳壹账通智能科技有限公司 Block chain-based relationship proving method, device, equipment and storage medium
CN110598394B (en) * 2019-03-28 2021-12-21 腾讯科技(深圳)有限公司 Authority verification method and device and storage medium
CN111601280B (en) * 2020-05-14 2022-08-19 中国联合网络通信集团有限公司 Access verification method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487801A (en) * 2016-11-03 2017-03-08 江苏通付盾科技有限公司 Information Authentication method and device based on block chain
CN107749848A (en) * 2017-10-23 2018-03-02 中国联合网络通信集团有限公司 Processing method, device and the Internet of things system of Internet of Things data
CN107846282A (en) * 2017-11-03 2018-03-27 法信公证云(厦门)科技有限公司 A kind of electronic data distribution keeping method and system based on block chain technology
US10790976B1 (en) * 2018-08-01 2020-09-29 Bloomio Ag System and method of blockchain wallet recovery
CN109587238A (en) * 2018-12-03 2019-04-05 百度在线网络技术(北京)有限公司 The data processing of block chain and synchronous method, device, equipment and storage medium
CN109981682A (en) * 2019-04-10 2019-07-05 北京阿尔山区块链联盟科技有限公司 Data verification method, the apparatus and system of internet of things equipment
CN110457928A (en) * 2019-08-16 2019-11-15 重庆华医康道科技有限公司 Doctor based on block chain looks forward to cooperation internet hospital data method for protecting
CN111010372A (en) * 2019-11-20 2020-04-14 国家信息中心 Block chain network identity authentication system, data processing method and gateway equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的安全车联网数字取证系统;李萌;司成祥;祝烈煌;;物联网学报(第02期);全文 *

Also Published As

Publication number Publication date
CN112243008A (en) 2021-01-19

Similar Documents

Publication Publication Date Title
CN107770182B (en) Data storage method of home gateway and home gateway
CN109922039B (en) Semi-centralized identity management method based on block chain technology
CN107742212B (en) Asset verification method, device and system based on block chain
CN111147460B (en) Block chain-based cooperative fine-grained access control method
CN111194034B (en) Authentication method and device
CN106790261B (en) Distributed file system and method for authenticating communication between its interior joint
CN111246481B (en) Micro base station authentication method and terminal
CN112152778B (en) Node management method and device and electronic equipment
CN111601280B (en) Access verification method and device
CN113285932B (en) Method for acquiring edge service, server and edge device
CN114338242B (en) Cross-domain single sign-on access method and system based on block chain technology
CN114793184B (en) Security chip communication method and device based on third-party key management node
CN110719167B (en) Block chain-based signcryption method with timeliness
CN115883154A (en) Access certificate issuing method, block chain-based data access method and device
CN110493002B (en) Method, device and system for renewing certificate
CN112243008B (en) Data management method and device
CN113965425A (en) Access method, device and equipment of Internet of things equipment and computer readable storage medium
CN114978730B (en) Security detection method and storage medium for Internet of things at perceived situation
CN114448633B (en) File encryption method and device based on quantum key, electronic equipment and medium
CN113872986B (en) Power distribution terminal authentication method and device and computer equipment
CN113452519B (en) Key synchronization method and device, computer equipment and storage medium
CN112637298B (en) Authentication method and member node
CN112398820B (en) Data management method and device
Brorsson et al. Guarding the guards: Accountable authorities in vanets
CN110661777A (en) Data transmission method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant